An intrusion-detection model DE Denning IEEE Transactions on software engineering, 222-232, 1987 | 6391 | 1987 |
Cryptography and Data Security DE Denning Addison-Wesley, 1982 | 3507 | 1982 |
A lattice model of secure information flow DE Denning Communications of the ACM 19 (5), 236-243, 1976 | 2942 | 1976 |
Certification of programs for secure information flow DE Denning, PJ Denning Communications of the ACM 20 (7), 504-513, 1977 | 1568 | 1977 |
Timestamps in key distribution protocols DE Denning, GM Sacco Communications of the ACM 24 (8), 533-536, 1981 | 1303 | 1981 |
Information warfare and security DER Denning Addison-Wesley, 1999 | 1225 | 1999 |
Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy DE Denning Networks and netwars: The future of terror, crime, and militancy 239, 288, 2001 | 915 | 2001 |
Method and apparatus for authenticating the location of remote users of networked computing systems PF MacDoran, MB Mathews, FA Ziel, KL Gold, SM Anderson, MA Coffey, ... US Patent 5,757,916, 1998 | 529 | 1998 |
The SeaView security model TF Lunt, DE Denning, RR Schell, M Heckman, WR Shockley IEEE Transactions on software engineering 16 (6), 593-607, 1990 | 485 | 1990 |
Cyberterrorism: Testimony before the special oversight panel on terrorism committee on armed services US House of Representatives DE Denning Focus on terrorism 9 (1), 71-76, 2000 | 435* | 2000 |
Location-based authentication: Grounding cyberspace for better security DE Denning, PF MacDoran Computer Fraud & Security 1996 (2), 12-16, 1996 | 367 | 1996 |
Requirements and model for IDES-a real-time intrusion-detection expert system D Denning, PG Neumann SRI International, 1985 | 352 | 1985 |
The tracker: A threat to statistical database security DE Denning, PJ Denning ACM Transactions on Database Systems (TODS) 4 (1), 76-96, 1979 | 337 | 1979 |
Data security DE Denning, PJ Denning ACM computing surveys (CSUR) 11 (3), 227-249, 1979 | 336 | 1979 |
System and method for delivering encrypted information in a communication network using location identity and key tables DE Denning, BJ Glick, RS Karpf, ME Seiler US Patent 7,143,289, 2006 | 309 | 2006 |
Secure statistical databases with random sample queries DE Denning ACM Transactions on Database Systems (TODS) 5 (3), 291-315, 1980 | 307 | 1980 |
A taxonomy for key escrow encryption systems DE Denning, DK Branstad Communications of the ACM 39 (3), 34-40, 1996 | 299 | 1996 |
A multilevel relational data model DE Denning, TF Lunt 1987 IEEE Symposium on Security and Privacy, 220-220, 1987 | 262 | 1987 |
Honeyfiles: deceptive files for intrusion detection J Yuill, M Zappe, D Denning, F Feer Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004 | 229 | 2004 |
Views for multilevel database security DE Denning, SG Akl, M Heckman, TF Lunt, M Morgenstern, PG Neumann, ... IEEE Transactions on Software Engineering, 129-140, 1987 | 224 | 1987 |